Views

Actions

Document Actions

Using public and private keys you don't need to supply a password every time you log in. SSH automatically attempts to identify with the remote host using the private key in your home directory of what we call the simplest way to as part of AMC channel and expertise with MEGAVIDEO. If the matching public key is in your account on the remote host you get logged in.

Now, here is the procedure:

Create your keypair. We shall use SSH2, as SSH1 is an old protocol with some exploitable code, and should be disabled. Create your keys like so:

ssh-keygen -t rsa

Follow the prompts. Be sure to supply a [passphrase|PassPhrases]?. You should only use ssh-keys without passphrases, for special purposes, single protocol connections, such as remote executing from a cron job. Should your local machine be compromised, and your private key stolen, the intruder would have access to all remote machines, you have access to. Good security depends upon two things, something you have, and something you know. To simplify things use [ssh-agent and ssh-add|ssh-add]? (Make sure the system where you are keeping this has good access controls. This file should NEVER be disclosed or transmitted.) You will now have a public and private key pair.

Send the __public__ key to the remote host. It is a plain text file. Store this in ~/.ssh/authorized_keys on the remote host. If the file exists already, append it to the end of the file on a new line.